Intelligent Document Reader AT10Ki User Guide
Networked mode operation
Page 32 of 41
The reader connects to and authenticates the update server (whether Gemalto or customer
hosted). The reader downloads the update package and runs the update procedure. Updates can
be
Scheduled
(automatic)
or Requested
(manual command via Web-UI or Web-API).
The Gemalto AT10Ki reader then downloads the update and checks the digital signature of the release
against the Gemalto public certificate stored in the reader. If the update package is valid then the reader
will update itself. The reader will finish by rebooting.
The reader holds one software build and factory default. Roll-back is via factory reset and then a push
with the required release.
Managing an estate of readers
Gemalto provides tools to help manage a network of readers:
Device discovery tool to look for devices on the network and report status including software
versions, configuration and location
Various methods of software update deployment
Diagnostic reporting and error logging
Use the Web-UI to connect to the reader and read test documents
For more information please refer to the appropriate tool or software manual.
Device security summary
Gemalto
takes the security of our customers’ data and networks very seriously and has built security into
the Gemalto Intelligent Document Reader AT10Ki. This includes:
Data at rest:
Passport data is never stored on device, it is only in memory during a ‘session’ opened by the
Web-API
Diagnostic data is limited in scope and can only be sent to pre-designated addresses
Data in flight:
Data is protected in flight with a symmetric AES-256 cipher. The symmetric key is
exchanged by an Elliptic curve, NIST 521, Diffie-Hellman key exchange
A pre-installed shared secret (API-
key) ensures device authenticates with the customer’s
back-end system
Secure certificate storage
Secured updates:
During updates the reader authenticates with the update server
The update image’s signature is validated prior to installation
All update images are signed by Gemalto
No admin/root access for customers
Secured boot:
Each stage of the boot process is validated so only valid software can be executed, trust to
rooted to private key stored in hardware